-
1
-
-
84866107712
-
Privacy in the age of big data: A time for big decisions
-
O. Tene, J. Polonetsky, "Privacy in the Age of Big Data: a Time for Big Decisions," Stanford Law Review, vol. 64, pp. 63-69, 2012.
-
(2012)
Stanford Law Review
, vol.64
, pp. 63-69
-
-
Tene, O.1
Polonetsky, J.2
-
2
-
-
84908623993
-
-
Accessed 1 6 2014
-
P. Olson, "Meet The Company That Tracks More Phones Than Google Or Facebook," 30 10 2013. [Online]. Available: http://www.forbes.com/sites/parmyolson/2013/10/30/meet-thecompany-that-tracks-more-phones-than-google-or-facebook/.[Accessed 1 6 2014].
-
(2013)
Meet the Company That Tracks More Phones Than Google or Facebook
, vol.30
, Issue.10
-
-
Olson, P.1
-
5
-
-
84908623992
-
-
Columbia University Computer Science Technical Reports, New York
-
S. Sheth, G. Kaiser, and W. Maalej, "Us and them-A Study of Privacy Requirements Across North America, Asia, and Europe," Columbia University Computer Science Technical Reports, New York, 2013.
-
(2013)
Us and Them-A Study of Privacy Requirements Across North America, Asia, and Europe
-
-
Sheth, S.1
Kaiser, G.2
Maalej, W.3
-
7
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
P. Ohm, "Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization," UCLA Law Review, vol. 57, pp. 1701-1777, 2010.
-
(2010)
UCLA Law Review
, vol.57
, pp. 1701-1777
-
-
Ohm, P.1
-
10
-
-
84908657937
-
The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR
-
J. Kokott and C. Sobotta, "The Distinction between Privacy and Data Protection in the Jurisprudence of the CJEU and the ECtHR," International Data Privacy Law, vol. 3, no. 4, 2013.
-
(2013)
International Data Privacy Law
, vol.3
, Issue.4
-
-
Kokott, J.1
Sobotta, C.2
-
12
-
-
83655202879
-
Stealing Reality: When Criminals become Data Scientists (or Vice Versa)
-
Y. Altshuler, N. Aharony, A. Pentland, et al., "Stealing Reality: when Criminals become Data Scientists (or Vice Versa)," IEEE Intelligent Systems Magazine, vol. 26, no. 6, pp. 22-30, 2011.
-
(2011)
IEEE Intelligent Systems Magazine
, vol.26
, Issue.6
, pp. 22-30
-
-
Altshuler, Y.1
Aharony, N.2
Pentland, A.3
-
14
-
-
84908623990
-
-
Baltimore, US
-
N. Wang, H. Xu, P. Wisniewski, and J. Grossklags, Designing the Default Privacy Settings for Facebook Applications, Baltimore, US, 2014.
-
(2014)
Designing the Default Privacy Settings for Facebook Applications
-
-
Wang, N.1
Xu, H.2
Wisniewski, P.3
Grossklags, J.4
-
18
-
-
84908645607
-
-
Digital Rights Ireland, C-293/12 and C-594/12
-
European Court of Justice, Digital Rights Ireland, C-293/12 and C-594/12, 2014.
-
(2014)
European Court of Justice
-
-
-
19
-
-
84908623989
-
-
21 5 2014. [Online]. Available: [Accessed 23 5
-
D. Tokmetzis, "Dit gebeurt er allemaal onder de motorkap van je smartphone," 21 5 2014. [Online]. Available: https://decorrespondent.nl/1034/dit-gebeurt-er-allemaal-onderde-motorkap-van-je-smartphone/50352698-785491ea. [Accessed 23 5 2014].
-
(2014)
Dit Gebeurt Er Allemaal Onder de Motorkap Van Je Smartphone
-
-
Tokmetzis, D.1
-
21
-
-
84863575605
-
-
17 December 2010. [Online]. Available Accessed 25 5
-
S. Thurm, Y.I. Kane, "Your Apps Are Watching You," 17 December 2010. [Online]. Available: http://online.wsj.com/news/articles/SB100014240527487046940 04576020083703574602mg=reno64-wsjurl=http%3A%2F%2Fonline.wsj.com%2Farticle%2FSB10 001424052748704694004576020083703574602.html. [Accessed 25 5 2014].
-
(2014)
Your Apps Are Watching You
-
-
Thurm, S.1
Kane, Y.I.2
-
22
-
-
84884255550
-
Privacy self-management and the consent dilemma
-
D. Solove, "Privacy Self-Management and the Consent Dilemma," Harvard Law Review, vol. 126, pp. 1879-2139, 2013.
-
(2013)
Harvard Law Review
, vol.126
, pp. 1879-2139
-
-
Solove, D.1
-
23
-
-
19944367736
-
Personal Privacy through Understanding and Action: Five Pitfalls for Designers
-
S. Lederer, J.I. Hong, A.K. Dey, and J.A. Landay, "Personal Privacy through Understanding and Action: Five Pitfalls for Designers," Personal and Ubiquitous Computing, vol. 8, no. 6, pp. 440-454, 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.6
, pp. 440-454
-
-
Lederer, S.1
Hong, J.I.2
Dey, A.K.3
Landay, J.A.4
-
30
-
-
84886066391
-
Engineering privacy by design
-
Belgium
-
S. Gürses, C. Troncoso and C. Diaz, "Engineering Privacy by Design," in Conference on Computers, Privacy and Data Protection, Belgium, 2011.
-
(2011)
Conference on Computers, Privacy and Data Protection
-
-
Gürses, S.1
Troncoso, C.2
Diaz, C.3
-
32
-
-
60449120378
-
Engineering privacy
-
S. Spiekermann, and L.F. Cranor, "Engineering Privacy," IEEE Transactions on Software Engineering, vol. 35, no. 1, 2009.
-
(2009)
IEEE Transactions on Software Engineering
, vol.35
, Issue.1
-
-
Spiekermann, S.1
Cranor, L.F.2
-
34
-
-
82955190606
-
Analyzing facebook privacy settings: User expectations vs reality
-
Y. Liu, K.P. Gummadi, B. Krishnamurthy, and A. Mislove, "Analyzing Facebook Privacy Settings: User Expectations vs. Reality," in SIGCOMM, 2011.
-
(2011)
SIGCOMM
-
-
Liu, Y.1
Gummadi, K.P.2
Krishnamurthy, B.3
Mislove, A.4
-
35
-
-
84878864910
-
Silent listeners: The evolution of privacy and disclosure on facebook
-
F. Stutzman, R. Gross, and A. Acquisti, "Silent Listeners: the Evolution of Privacy and Disclosure on Facebook," Journal of Privacy and Confidentiality, vol. 4, no. 2, 2013.
-
(2013)
Journal of Privacy and Confidentiality
, vol.4
, Issue.2
-
-
Stutzman, F.1
Gross, R.2
Acquisti, A.3
-
37
-
-
84861047198
-
C4ps: Colors for privacy settings
-
T. Paul, M. Stopczynski, D. Puscher, M. Volkamer, and T. Strufe, "C4ps: Colors for Privacy Settings," in International Conference on World Wide Web, New York, 2012.
-
(2012)
International Conference on World Wide Web, New York
-
-
Paul, T.1
Stopczynski, M.2
Puscher, D.3
Volkamer, M.4
Strufe, T.5
-
38
-
-
77954588562
-
Collective privacy management in social networks
-
A.C. Squicciarini, M. Shehab, and F. Paci, "Collective Privacy Management in Social Networks," in International Conference on World Wide Web, New York, 2009.
-
(2009)
International Conference on World Wide Web, New York
-
-
Squicciarini, A.C.1
Shehab, M.2
Paci, F.3
-
39
-
-
84861051743
-
Photo-Tape: User privacy preferences in photo tagging
-
V. Toubiana, V. Verdot, B. Christophe, and M. Boussard, "Photo-Tape: User Privacy Preferences in Photo Tagging," in International Conference on World Wide Web, New York, 2012.
-
(2012)
International Conference on World Wide Web, New York
-
-
Toubiana, V.1
Verdot, V.2
Christophe, B.3
Boussard, M.4
-
41
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V.S. Verykios, E. Bertino, I.N. Fovino, et al., "State-of-the-Art in Privacy Preserving Data Mining," in SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
-
42
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized pertubation techniques
-
H. Polat and W. Du, "Privacy-Preserving Collaborative Filtering Using Randomized Pertubation Techniques," in International Conference on Data Mining, 2003.
-
(2003)
International Conference on Data Mining
-
-
Polat, H.1
Du, W.2
-
43
-
-
42149132726
-
Private distributed collaborative filtering using estimated concordance measures
-
N Lathia, S. Hailes, and L. Capra, "Private Distributed Collaborative Filtering Using Estimated Concordance Measures," in ACM Conference on Recommender Systems, New York, 2007.
-
(2007)
ACM Conference on Recommender Systems, New York
-
-
Lathia, N.1
Hailes, S.2
Capra, L.3
-
45
-
-
77954619853
-
Privacy in dynamic social networks
-
S. Bhagat, G. Cormode, B. Krishnamurthy, and D. Srivastava, "Privacy in Dynamic Social Networks," in International Conference on World Wide Web, 2010, 2010.
-
(2010)
International Conference on World Wide Web 2010
-
-
Bhagat, S.1
Cormode, G.2
Krishnamurthy, B.3
Srivastava, D.4
-
47
-
-
70349832810
-
How to break anonymity of the netflix prize dataset
-
A. Narayanan and V. Schmatikov, "How to Break Anonymity of the Netflix Prize Dataset," in CORR, 2006.
-
(2006)
CORR
-
-
Narayanan, A.1
Schmatikov, V.2
-
48
-
-
35348848696
-
Wherefore art thou r3579x: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore art thou r3579x: anonymized social networks, hidden patterns, and structural steganography," in International Conference on World Wide Web, New York, 2007.
-
(2007)
International Conference on World Wide Web, New York
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
52
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
L. Sweeney, "K-Anonymity: a Model for Protecting Privacy," International Journal on Uncertainty, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
53
-
-
80053203782
-
Testing software in age of data privacy: A balancing act
-
K. Taneja, M. Grechanik, R. Ghani, and T. Xie, "Testing Software in Age of Data Privacy: a Balancing Act," in SIGSOFT/FSE, New York, 2011.
-
(2011)
SIGSOFT/FSE, New York
-
-
Taneja, K.1
Grechanik, M.2
Ghani, R.3
Xie, T.4
-
56
-
-
85143190436
-
In the best families: Tracking and relationships
-
C. Mancini, Y. Roggers, K. Thomas, et al., "In the Best Families: Tracking and Relationships," in CHI, 2011.
-
(2011)
CHI
-
-
Mancini, C.1
Roggers, Y.2
Thomas, K.3
-
57
-
-
84870703690
-
Privacy arguments: Analysing selective disclosure requirements for mobile applications
-
T.T. Tun, A.K. Bandara, B.A. Price, et al., "Privacy arguments: analysing selective disclosure requirements for mobile applications," in IEEE Computer Society, 2012.
-
(2012)
IEEE Computer Society
-
-
Tun, T.T.1
Bandara, A.K.2
Price, B.A.3
-
58
-
-
84908623968
-
Engineering Adaptive Privacy: On the role of privacy awareness requirements
-
I. Omoronyia, L. Cavallaro, M. Salehie, et al., "Engineering Adaptive Privacy: on the role of privacy awareness requirements," in ACM ICSE, 2013.
-
(2013)
ACM ICSE
-
-
Omoronyia, I.1
Cavallaro, L.2
Salehie, M.3
-
59
-
-
84948114701
-
-
Springer
-
M. Robillard, W. Maalej, R.J. Walker, and T. Zimmerman (eds.), Recommendation Systems in Software Engineering, Springer, 2014.
-
(2014)
Recommendation Systems in Software Engineering
-
-
Robillard, M.1
Maalej, W.2
Walker, R.J.3
Zimmerman, T.4
-
62
-
-
84908623966
-
-
EU Parliament EU Council Directive
-
EU Parliament and EU Council, Directive 2002/58/EC as revised by 2009/136/EC, http://eurlex. europa.eu/LexUriServ/LexUriServ.douri=OJ:L:2009:337:0 011:0036:en:PDF, 2009.
-
(2002)
58/EC As Revised by 2009/136/EC
-
-
-
63
-
-
84908642043
-
Political and ethical perspectives on data obfuscation
-
Routledge
-
F. Brunton, H. Nissenbaum, "Political and Ethical Perspectives on Data Obfuscation," in Privacy, Due Process and the Computational Turn: the Philosophy of Law meets the Philosophy of Technology, Routledge, 2013, pp. 171-195.
-
(2013)
Privacy, Due Process and the Computational Turn: The Philosophy of Law Meets the Philosophy of Technology
, pp. 171-195
-
-
Brunton, F.1
Nissenbaum, H.2
|